scientific article; zbMATH DE number 1942428
From MaRDI portal
Publication:4409126
zbMath1027.68058MaRDI QIDQ4409126
Publication date: 30 June 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2442/24420304.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (27)
Convergence of some time inhomogeneous Markov chains via spectral techniques ⋮ On the structural weakness of the GGHN stream cipher ⋮ Generation of the symmetric group Sn2 ⋮ Tweakable Blockciphers with Asymptotically Optimal Security ⋮ Full Plaintext Recovery Attack on Broadcast RC4 ⋮ Further non-randomness in RC4, RC4A and VMPC ⋮ Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher ⋮ New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4 ⋮ (Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher ⋮ On Non-randomness of the Permutation After RC4 Key Scheduling ⋮ Proving TLS-attack related open biases of RC4 ⋮ Attack on Broadcast RC4 Revisited ⋮ Analysis of burn-in period for RC4 state transition ⋮ Unnamed Item ⋮ Passive–Only Key Recovery Attacks on RC4 ⋮ Permutation After RC4 Key Scheduling Reveals the Secret Key ⋮ Attacks on the RC4 stream cipher ⋮ On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key ⋮ Mixing time of the card-cyclic-to-random shuffle ⋮ Cutoff for the cyclic adjacent transposition shuffle ⋮ Discovery and Exploitation of New Biases in RC4 ⋮ New Correlations of RC4 PRGA Using Nonzero-Bit Differences ⋮ Settling the mystery of \(Z_{r} = r\) in RC4 ⋮ On biases of permutation and keystream bytes of RC4 towards the secret key ⋮ A new distinguishing and key recovery attack on NGG stream cipher ⋮ Analysis of RC4 and Proposal of Additional Layers for Better Security Margin ⋮ New Results on the Key Scheduling Algorithm of RC4
This page was built for publication: